Search21 Results
- Knowledge Base
- Infrastructure
All faculty and staff automatically have a Crashplan account created for them 24 hours after their UIC account has been created. To begin using Crashplan, simply install the client on your machine and your files should automatically begin backing up.
NOTE: Crashplan is free to use for all faculty and staff.
- Knowledge Base
- Information Security
- Knowledge Base
- Information Security
How to access a unit's training page in KnowBe4, view the users in that unit as well as their status and how to download a CSV of the data
- Knowledge Base
- Infrastructure
The document explains the cost of each available service tier option and the services included in each service tier option
- Knowledge Base
- Information Security
Your data deserves protection. The UIC license for Symantec Encryption Desktop provides easy to use and secure encryption to protect sensitive data on your laptop or desktop computers. Laptops are easily lost, and even desktop computers can be stolen. Symantec Encryption Desktop also includes a secure shredder, to really delete files you want to delete. A major motivation for using Symantec Encryption Desktop is to fulfill HIPAA requirements.
- Knowledge Base
- Information Security
Step-by-Step Guide to Upgrade Splunk Forwarder
- Knowledge Base
- Information Security
2-factor authentication (2FA) is an extra layer of security protection for your sensitive, personal university data.
- Knowledge Base
- Communication and Collaboration
Individuals in a covered component of the University of Illinois Covered Entity may access the HIPAA compliant "UIC PHI" Zoom portal, capable of creating secure meetings for discussing PHI and providing telehealth services.
- Knowledge Base
- Information Security
- Knowledge Base
- Infrastructure
Key features and requirements of the Technology Solutions West Campus Data Center are listed below.
- Knowledge Base
- Information Security
Once the client has been installed, you'll be automatically prompted to encrypt your machine. This period is around 24 hours.
- Knowledge Base
- Information Security
This article details common issues associated with encryption.
- Knowledge Base
- Information Security
- Knowledge Base
- Information Security
This is a list of free Qualys training sources and links.
- Knowledge Base
- Information Security
This is a list of free Splunk training sources and links.